getcursor / cursor

The AI Code Editor
https://cursor.com
23.28k stars 1.48k forks source link

Cursor Requested Access to Other Applications: How to Discard Approval? #1611

Closed alexmazaltov closed 1 month ago

alexmazaltov commented 1 month ago

I recently encountered an issue where the Cursor application on a managed PC requested access to other applications. This raised several security and compliance concerns, especially in the context of potential supply chain attacks. Such attacks can have serious consequences, including data breaches, unauthorized access, and compromise of sensitive information.

Problem:

Potential Risks

Supply chain attacks can exploit these vulnerabilities to:

Security Concerns

Granting unwarranted application access without due diligence can lead to:

Proposed Solutions

To address this issue and safeguard the digital supply chain, consider implementing the following strategies:

  1. Immediate Reversal of Approvals:
    • Provide clear instructions for users to revoke any granted permissions for the Cursor application.
    • Ensure that these instructions are easily accessible and understandable.
  2. Enhanced Access Controls:
    • Implement stricter access controls and approval processes for application permissions.
    • Require multi-factor authentication (MFA) for all access requests.
  3. Regular Security Audits:
    • Conduct regular security audits and vulnerability assessments on all applications.
    • Ensure that security patches and updates are applied promptly.
  4. User Training and Awareness:
    • Educate users on the importance of scrutinizing application permission requests.
    • Promote awareness about the potential risks of supply chain attacks.
  5. Collaborate with Vendors:
    • Work closely with application vendors to ensure they follow security best practices.
    • Request detailed security documentation and compliance certifications.
  6. Implement Monitoring Tools:
    • Use monitoring tools to track and log all application access requests.
    • Set up alerts for any unusual or unauthorized access attempts.

Conclusion

Ensuring the security of the digital supply chain is paramount in preventing supply chain attacks. By taking proactive measures and fostering a culture of security awareness, organizations can protect themselves against these evolving threats.

If there are any additional measures or specific steps that need to be taken to resolve this issue, please provide guidance or documentation.

Thank you for addressing this important security concern.

alexmazaltov commented 1 month ago

Solved!

After Cursor application update:

Bulletninja commented 1 month ago

Solved!

After Cursor application update:

  • New Request to allow or deny access to other applications appeared.

I don't understand what this means. How is it solved? Is the location for denial (after allowing) documented somewhere?